ID CVE-2007-1408
Type cve
Reporter cve@mitre.org
Modified 2008-09-05T21:20:00
Description
Multiple vulnerabilities in (1) bank.php, (2) landfill.php, (3) outposts.php, (4) tribes.php, (5) house.php, (6) tribearmor.php, (7) tribeastral.php, (8) tribeware.php, and (9) includes/head.php in Bartek Jasicki Vallheru before 1.3 beta have unknown impact and remote attack vectors, probably related to large integer values containing more than 15 digits. NOTE: the original vendor report is for integer overflows, but this is probably an incorrect usage of the term.
This vulnerability is addressed in the following product release:
Vallheru, Vallheru, 1.3 Beta
{"id": "CVE-2007-1408", "bulletinFamily": "NVD", "title": "CVE-2007-1408", "description": "Multiple vulnerabilities in (1) bank.php, (2) landfill.php, (3) outposts.php, (4) tribes.php, (5) house.php, (6) tribearmor.php, (7) tribeastral.php, (8) tribeware.php, and (9) includes/head.php in Bartek Jasicki Vallheru before 1.3 beta have unknown impact and remote attack vectors, probably related to large integer values containing more than 15 digits. NOTE: the original vendor report is for integer overflows, but this is probably an incorrect usage of the term.\nThis vulnerability is addressed in the following product release:\r\nVallheru, Vallheru, 1.3 Beta", "published": "2007-03-10T22:19:00", "modified": "2008-09-05T21:20:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1408", "reporter": "cve@mitre.org", "references": ["http://sourceforge.net/project/shownotes.php?release_id=491871&group_id=118350", "http://sourceforge.net/forum/forum.php?forum_id=672237", "http://vallheru.svn.sourceforge.net/viewvc/vallheru/vallheru2/bank.php?r1=910&r2=918"], "cvelist": ["CVE-2007-1408"], "type": "cve", "lastseen": "2019-05-29T18:08:58", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "005c835a315a4eccb15c67fcaee4aa5b"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cpe23", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "6292e92559f57a6b3fc514483b5b7c25"}, {"key": "cvss", "hash": "edfca85c4c320ffaa9dcfdcb6a20ce1d"}, {"key": "cvss2", "hash": "729f98bc4a65b3e0e24ddfee3d3c4450"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "c642f37dd5189706d5cd82d5ad35b04c"}, {"key": "href", "hash": "b9f52d5184a9192d94e95c303c73440d"}, {"key": "modified", "hash": "9637e6366c78ab8125b6843c0eb4d79f"}, {"key": "published", "hash": "1a154e406c7034c7ee2bde4ef287ecd3"}, {"key": "references", "hash": "44422835264eef35dfbc8cbb32abbc5d"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "edb4c6058bfc637ceafaa229f969f907"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "360fb0c87f18b884e577341ad836f1df3d33b2019c85054c3229ffcd3705b48a", "viewCount": 0, "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2019-05-29T18:08:58"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:33500"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7386"]}], "modified": "2019-05-29T18:08:58"}, "vulnersScore": 6.3}, "objectVersion": "1.3", "cpe": [], "affectedSoftware": [{"name": "vallheru vallheru", "operator": "le", "version": "1.0.6"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": [], "cwe": ["NVD-CWE-Other"]}
{"osvdb": [{"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 1.0.9, 1.3beta or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.vallheru-tech.livenet.pl/\nVendor URL: http://sourceforge.net/projects/vallheru/\nVendor Specific News/Changelog Entry: http://sourceforge.net/project/shownotes.php?group_id=118350&release_id=491871\nVendor Specific News/Changelog Entry: http://sourceforge.net/project/shownotes.php?group_id=118350&release_id=491075\nOther Advisory URL: http://vallheru.svn.sourceforge.net/viewvc/vallheru/vallheru2/bank.php?r1=910&r2=918\n[CVE-2007-1408](https://vulners.com/cve/CVE-2007-1408)\n", "modified": "2007-03-04T13:02:30", "published": "2007-03-04T13:02:30", "href": "https://vulners.com/osvdb/OSVDB:33500", "id": "OSVDB:33500", "title": "Vallheru Multiple Script Remote Overflow", "type": "osvdb", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:24", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2007-03-11T00:00:00", "published": "2007-03-11T00:00:00", "id": "SECURITYVULNS:VULN:7386", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7386", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}